General

  • Target

    5980150a9b9d581b94a9cb6b8847b371_JaffaCakes118

  • Size

    13.1MB

  • Sample

    241018-1jgzla1hrk

  • MD5

    5980150a9b9d581b94a9cb6b8847b371

  • SHA1

    230fa44c4240d10ac2033b003f093d6558c7bedf

  • SHA256

    1ab2488d36ca3a77d48e695c17e6d53ab072e5f10f368b74a718649b9c32b14c

  • SHA512

    4b63d8639db8a75b5b7349aaab83bd7c360a119337f72217a64816d582e543e1c77337add68e44c7d75793002974dce08e6c03dcecd20b91460b2ef8ef395f9d

  • SSDEEP

    393216:BKGmxHuGskGSu6TmlHwBFhPICHaf9pn5puWHFzL2HQyRG1:BuxPvTmtwfJTupFFyRG1

Malware Config

Targets

    • Target

      5980150a9b9d581b94a9cb6b8847b371_JaffaCakes118

    • Size

      13.1MB

    • MD5

      5980150a9b9d581b94a9cb6b8847b371

    • SHA1

      230fa44c4240d10ac2033b003f093d6558c7bedf

    • SHA256

      1ab2488d36ca3a77d48e695c17e6d53ab072e5f10f368b74a718649b9c32b14c

    • SHA512

      4b63d8639db8a75b5b7349aaab83bd7c360a119337f72217a64816d582e543e1c77337add68e44c7d75793002974dce08e6c03dcecd20b91460b2ef8ef395f9d

    • SSDEEP

      393216:BKGmxHuGskGSu6TmlHwBFhPICHaf9pn5puWHFzL2HQyRG1:BuxPvTmtwfJTupFFyRG1

    • Checks if the Android device is rooted.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the mobile country code (MCC)

MITRE ATT&CK Mobile v15

Tasks